News Feed January-February 2024

Published papers

  • Behnam Tonekaboni paper “Noise Decoupling for State Transfer in Continuous Variable Systems” has been accepted to be publish soon at Physical Review A, Phys. Rev. A 109, 032404 – In this study, we have developed a novel protocol aimed at suppressing noise in communication channels. Unlike qubits, which operate on discrete states, optical communication channels utilize continuous variable systems, subject to various types of noise. Inspired by the successful noise-suppressing strategy known as dynamical decoupling in qubits, we have discovered that employing multiple rotation controls can effectively mitigate noise in the channel, leading to the attainment of a high-fidelity final state. Furthermore, we provide numerical examples demonstrating the effectiveness of our protocol, particularly in scenarios where a combination of displacement and squeezing noise is present.

Publications accepted

  • Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Minhui Xue. “The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns”, accepted at The Web Conference 2024 (WWW, Core A*), short paper track. This paper introduces a comprehensive approach involving the interactions between the Adversary, Watchdog (e.g., detection tools), and Challengers (e.g., users) to formalize and decode deceptive pattern threats. Based on this, we propose a quantitative risk assessment system.
  • Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue. “Learn What You want To Unlearn: Unlearning Inversion Attacks against Machine Unlearning”, accepted at IEEE Symposium on Security and Privacy 2024 (Oakland, Core A*). This paper proposes unlearning inversion attacks on machine unlearning, showing that the unlearned data can be recovered through the differences of the original model and unlearned model.
  • Sajal Halder, Michael Bewong, Arash Mahboubi, Yinhao Jiang, Rafiqul Islam, Zahidul Islam, Ryan Ip Ho Leung, Muhammad  Ejaz Ahmed, Gowri Ramachandran and Muhammad Ali Babar. ” Malicious Package Detection using Metadata Information”, Accepted at The Web Conference 2024 (WWW, Core A*).  The paper presents a model that utilizes metadata for malicious package detection, enhancing effectiveness and showcasing resilience against adversarial attacks.
  • Yanjun Zhang, Ruoxi Sun, Liyue Shen, Guangdong Bai, Minhui Xue, Mark Huasong Meng, Xue Li, Ryan Ko, Surya Nepal. “Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience”, accepted at The Web Conference 2024 (WWW, Core A*). The paper proposes Confined Gradient Descent (CGD) that enhances the privacy of federated learning by eliminating the sharing of global model parameters, allowing the proprietary confined models to adapt to the heterogeneity in federated learning, providing inherent benefits of fairness.
  • Zihan Wang, Zhongkui Ma, Xinguo Feng, Ruoxi Sun, Hu Wang, Minhui Xue, Guangdong Bai. “CORELOCKER: Neuron-level Usage Control for AI Models”, accepted at IEEE Symposium on Security and Privacy 2024 (Oakland, Core A*). This paper proposes CoreLocker, employing the strategic extraction of a small subset of significant weights from the neural network, which serves as the access key to unlock the model’s complete capability, safeguarding the model from unauthorized use. 
  • Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, Minhui Xue, “Cardinality Counting in “Alcatraz”: A Privacy-aware Federated Learning Approach”, in ACM The Web Conference 2024 (WWW ‘2024, Core A*). This paper proposes a privacy-preserving federated K-means clustering approach for cardinality counting in Smart Health.
  • David D. Nguyen, David Liebowitz, Surya Nepal, Salil Kanhere, “Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions” in 38th AAAI Conference on Artificial Intelligence (AAAI-24) (A*). The paper introduces a novel multiple-output function and investigates its applicability across supervised and unsupervised problems.
  • Wai-Kong Lee, Raymond K. Zhao, Ron Steinfeld, Amin Sakzad, and Seong Oun Hwang “High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka“. IEEE Transactions on Parallel and Distributed Systems (TPDS), CORE A*. We develop the first high throughput implementation of the Falcon post-quantum digital signature scheme on Graphics Processing Units (GPUs). Falcon is one of the post-quantum digital signature scheme approved by the National Institute of Standards and Technology (NIST). With the fast deployment of GPU capabilities on cloud service platforms, our GPU-accelerated implementation may see adoptions in applications such as the Internet of Things (IoT).
  • Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang, “SoK: Rowhammer on Commodity Operating Systems”, Accepted by AsiaCCS (Data61 target venue; CORE A; Acceptance Rate = 19%) In this paper, we systematize rowhammer attacks and defenses with a focus on DRAM-based commodity systems. Particularly, we have established a unified framework demonstrating how a rowhammer attack affects a commodity system.
  • Chao Liu, Boxi Chen, Wei Shao, Chris Zhang, Kelvin Wong, Yi Zhang, “Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them” in IEEE Internet of Things (Target Venue, Q1, IF=10.6). Our study delves into the intricate security challenges posed by integrating Machine Learning (ML) with the Internet of Things (IoT). We thoroughly investigate a variety of security threats, including membership inference attacks, adversarial attacks, and poisoning attacks. Our research categorizes these threats according to adversary models, the objectives of the attacks, and the impacted security attributes, offering a depth of analysis beyond what previous studies have achieved. Furthermore, we scrutinize 65 different libraries designed to safeguard both model and data privacy within ML-powered IoT frameworks. This paper presents critical insights and proposes robust solutions aimed at enhancing the security of ML models and data amidst the rapidly evolving landscape of AI and IoT.
  • Erik Buchholz, Sharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere. “SoK: Can Trajectory Generation Combine Privacy and Utility?” accepted at Privacy Enhancing Technologies 2024 (PETS’24) Issue 3. [Data61 target venue; CORE A; Acceptance Rate (AR): 19.5%; Link to PDF]: This paper systematises approaches that target the privacy-preserving publication of location trajectories. Due to the prohibitive privacy-utility trade-off of conventional protection approaches, the release of synthetic data generated through generative deep learning models is considered a promising alternative. In a large-scale experimental study, both state-of-the-art models and generative models for sequential tasks from other domains are evaluated. The results highlight that currently, no solution can combine rigid privacy guarantees and good utility and that generative models from other domains are not readily applicable to trajectory generation. This work exposes a significant gap in the space of trajectory privacy and underlines the need for a generative trajectory model with strong privacy guarantees.
  • Nan Wang, Dongxi Liu, “FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup”, in PETS 2024 (CORE A). The paper proposes a new zero-knowledge range proof by combining the techniques of Flashproof and SwiftRange with a transparent setup.
  • Rayne Holland, Olya Ohrimenko, Anthony Wirth, “Single Round-trip Hierarchical ORAM via Succinct Indices,” ACM AsiaCCS 2024 (accepted, Core A). This paper presented a practical ORAM construction that matches the bandwidth overhead of the state-of-the-art approaches while reducing the client memory cost.  
  • Yashothara Shanmugarasa, M. A. P. Chamikara, Hye-young Paik, Salil S. Kanhere, and Liming Zhu. “Local Differential Privacy for Smart Meter Data Sharing With Energy Disaggregation” accepted at The 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS) (CORE B). This paper presents a novel LDP approach to facilitate the sharing of appliance-level energy consumption data over time while not revealing individual users’ appliance usage patterns.
  • Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo, “Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks” in Expert Systems with Applications, Elsevier [Q1 Ranked Journal, Impact Factor: 8.5]. This paper designs GraphSHS and Meta-GraphSHS graph neural network models to efficiently discover structural hole spanner nodes in large-scale and diverse networks, achieving high accuracy and significantly reducing computational cost.
  • Wei Shao, Yu Zhang, Pengfei Xiao, Kyle Kai Qin, Mohammad Saiedur Rahaman, Jeffrey Chan, Bin Guo, Andy Song, Flora D. Salim, “Transferrable contextual feature clusters for parking occupancy prediction“, in Pervasive Mobile Computing (Q1, IF=4.3). It provides a new solution for parking availability prediction when the local government does not have enough historical data.
  • Hang Bui Thanh, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahid Islam, Seyit A. Camtepe, Praveen Gauravaram, Dineshkumar Singh, M. Ali Babar, Shihao Yan, “Agriculture 4.0 and Beyond: Evaluating Cyber Threat Intelligence Sources and Techniques in Smart Farming Ecosystems” in Computer & Security, a Q1 ranked journal. This paper develops a comprehensive taxonomy of Cyber Threat Intelligence techniques and sources, specifically tailored for the Smart Farming Infrastructure context, addressing the unique cyber threat challenges in this domain.
  • Iqbal H Sarker, Helge Janicke, Mohamed Amine Ferrag, Sharif Abuadbba, “Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures” Accepted to Elsevier Internet of Things 2024, a Q1 ranked journal. This article provides an in-depth study on multi-aspect rule-based AI modeling considering human interpretable decisions as well as security automation and intelligence for critical infrastructures. It also provides a taxonomy of rule generation methods by considering not only knowledge-driven approaches based on human expertise but also data-driven ones, i.e., extracting insights or useful knowledge from data, and their hybridization.
  • Nazatul H. Sultan, Shabnam Kasra Kermanshahi, Hong Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi, “Securely Sharing Outsourced IoT Data: A Secure Access and Privacy Preserving Keyword Search Scheme”, in the Ad Hoc Networks, Elsevier (Q1 Rank). This paper proposes a novel keyword search scheme using computationally lightweight cryptographic primitives to empower the IoT data owners to securely share, store and manage encrypted data in the CSPs, providing better security and privacy.
  • Marthie Grobler and Tooba Aamir had a chapter accepted in the book ‘Psybersecurity: Human factors of cyber defence’. The chapter is titled ‘Building cognitive resilience for enhanced cyber governance’. In this chapter, we examine how cybersecurity attacks and events aim to exploit human psychology in the context of governance, as well as explore the triggers that adversaries manipulate to breach security. We discuss how these tactics compromise decision-making processes, data sharing, and citizen engagement, and how this would contribute to the potential erosion of public trust, compromise of sensitive data, and disruptions in governance operations. We further consider to what extent cyber resilience would contribute to one person or entity being more susceptible to cyber incidents than others and explore how cognitive resilience can build a cyber immunity that can be adopted in modern cyber governance frameworks.
  • M. Sayat; B. Shajilal; S. P. Kish; S. M. Assad; T. Symul; P. K. Lam; N. Rattenbury; J. Cater, “Satellite-to-Ground Continuous Variable Quantum Key Distribution: The Gaussian and Discrete Modulated Protocols in Low Earth Orbit,” in IEEE Transactions on Communications, doi: 10.1109/TCOMM.2024.3359295. The Gaussian modulated continuous variable quantum key distribution (GM-CVQKD) protocol is known to maximise the mutual information between two parties during quantum key distribution (QKD). An alternative modulation scheme is the discrete modulated CVQKD (DM-CVQKD) protocol. In this paper, we study the Phase Shift Keying (M-PSK) and Quadrature Amplitude Modulation (M QAM) DM-CVQKD protocols along with the GM-CVQKD protocol over a satellite-to-ground link in the low SNR regime. We use a satellite-to-ground link model which takes into account geometric losses, scintillation, and scattering losses from the link distance, atmospheric turbulence, and atmospheric aerosols, respectively. In addition, recent multidimensional (MD) and multilevel coding and multistage decoding (MLC-MSD) reconciliation method models in combination with multiedge-type low-density parity-check (MET-LDPC) code models have been used to determine the reconciliation efficiency. The results show that GM-CVQKD outperforms DM-CVQKD. In addition, GM-CVQKD with MD reconciliation outperforms GM-CVQKD with MLC-MSD reconciliation in the finite size limit by producing positive secret key rates at larger link distances and lower elevation angles.
  • Cody Christopher, Alban Grastien (2023). Critical Observations in Model-Based Diagnosis to Journal of Artificial Intelligence (AIJ), Elsevier (Q1 – CS 11.4, IF 14.4), the peak body journal for AI, pending minor revisions. Co-authored with former PhD supervisor formerly of the ANU, this paper is a condensed and updated version of material presented in PhD Thesis (2019), in AI Explanability extensions for classical AI diagnosis algorithms in formal systems.

Projects

  • Hajime Suzuki and Chandra Thapa participated in the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) Study Group 17 (SG17) meeting on security held in Geneva, Switzerland from 20 February to 1 March 2024.  They presented an input document (https://www.itu.int/md/T22-SG17-C-0558/en) contributing to the development of an international standard on software supply chain security.
  • Marthie Grobler and Lauren Ferro conducted a pilot session for the CSCRC project CL@BEL with NAB on 7 March. In this pilot session, they tested the new Corporates Compromised® banking scenario and the new hybrid setup that enables players to join in on the physical boardgame from a remote setting. Once the banking scenario is finalized, this will become part of the official service offering of Corporates Compromised®. The trademark for Corporates Compromised® was successfully registered.
  • Marthie Grobler and Tooba Aamir conducted a pilot session for the CSCRC project Cyber strategy for boards with the Department of Customer Services, NSW Government on 8 March. This project assists board directors and executives to develop an organisational cybersecurity strategy, identify and document cybersecurity priorities, define the organisation’s cybersecurity posture  and increase their understanding of cybersecurity risks. During the pilot session, they will test the final service offering (toolset) of the project before the project closes in April.

Good news

Staff and students

  • Since 1/1/24 we have welcome 1 research technician (Sajal Halder), 2 postdocs (Hua Ma and Kane Walter) and one student (Xu Shangzhi)
  • David D. Nguyen and Nan Wu received their PhD degree.
  • Five students were recognised as top contributors in the 2022/2023 journal club sessions. Congratulations to Duy Le (Victoria), Falih Febrinanto (Victoria), Jair Ferreira Da Silva Ferreira Junior (Victoria), Baiqi Chen (Queensland) and Mengyao Ma (Queensland). See below for some photos from the event. 

 

Media Release / International and National recognition

Networking / Conferences

  • Marthie Grobler attended the CISC (Critical Infrastructure Security Centre)’s TISN (Trusted Information Sharing Network) workshop with Department of Home Affairs. She was part of the CIPR mission team that co-facilitated a round-robin networking session with 10 sector groups. This collaboration with CISC is a strategically important aspect of the mission roadmap. CSIRO is now tasked with analysing the data arising from this workshop. https://www.linkedin.com/feed/update/urn:li:activity:7173844980132667394/
  • Dr Muhammad Usman organised a half-day long Quantum Artificial Intelligence tutorial session at Super Computing Asia Feb 19  2024 Conference in Sydney. The tutorial session was attended by over 100 researchers with diverse background in computer science, engineering and physical sciences. He delivered a keynote talk on Quantum Algorithms and Software at Quantum Meets Resources event in Adelaide organised by the Chief Scientist of Australia’s office on 14th of Feb.
  • Gareth Parker attended the ‘Australian Defence Magazine (ADM) Congress’ on Feb 21 and presented on ’CSIRO – An Opportunity for Defence’.  There were roughly 500 attendees, including from the military, Department of Defence and defence industry.  It was a useful opportunity to raise understanding within that community around some of the past and present contributions to Defence and the potential opportunity through the SAR challenge. Gareth Introduced David Tynan and Sim Cox to two of the DSTG Chiefs of Division with the greatest potential for collaboration with CSIRO: Suneel Randhawa (Chief, Information Sciences) and Sylvie Perreau (Chief, Sensors and Effectors).  David and Sim are now coordinating introductory meetings between those Chiefs of Division and corresponding CSIRO BU directors. He coordinated a meeting between CINTEL leaders and DSTG researchers conducting human-machine teaming research for ‘command and control’. It was enthusiastically agreed to progress a collaboration by first focusing on a common interest in the key quality of human-machine teaming- trust, as well as workflows. Gareth also participated in the ‘AI for LIFE CRC’ pre-first submission consultation/workshop in Adelaide
  • Amena Khatun attended Quantum Australia 2024 in Sydney, which was held from Feb 20 to Feb 22. During the event, she presented her poster on Quantum Generative Adversarial Networks. The event featured presentations from prominent figures in quantum technology, panel discussions, and poster sessions aimed at fostering idea exchange and development.

  • Amena Khatun is actively contributing as one of the advisors in the Next Generation Graduates Learning Advisory Group. In this role, she is providing support and guidance to students, assisting them in enhancing their skills and experiences. Amena has been selected to participate in Science Meets Parliament 2024, scheduled for March 20 to March 21 at Parliament House, Canberra. This prestigious event facilitates meaningful interactions between federal Parliamentarians and professionals in the field of science and technology. 
  • Akib Karim presented a talk called Low Depth Virtual Distillation of Quantum Circuits by Deterministic Circuit Decomposition at the Melbourne Quantum Summit at Feb 12-13.
  • Jiafan Wang attended NDSS  from 26 February–1 March 2024,  (target venue, Core A*). He presented his paper “Unus pro omnibus: Multi-Client Searchable Encryption via Access Control” and acted as the session chair for Future Cryptography.

  • Behnam Tonekaboni Faghihnasiri was in the organiser committee of Melbourne Quantum Summit (Theoretical quantum workshop in Melbourne) – Quantum Systems had strong presence in this workshop Feb 12-13. Behnam also attended Quantum Australia which was held from Feb 20 to Feb 22.
  •  

  • Farina Riaz has attended Quantum Australia from Feb 20th to Feb 22nd 2024 and have presented poster “Application of Quantum Pre-Processing Filter for Binary Image Classification with Small Samples”.
  •    

  • Farina Riaz has presented as a session chair/ speaker in International Women Day organised by “Women in AI” on 14th March 2024, representing Women in Quantum. Data61 National Centre for AI, Director Stela Solar was also keynote speaker in the conference. CSIRO presence in these women day events always make a mark as an organisation supporting diversity and inclusion.
  • Chandra Thapa presented “Distributed Collaborative Machine Learning and a Case Study” at the University of Zurich, Zurich, Switzerland. The main contact is Prof. Burkhard Stiller (director of the communication systems group, who mainly works on cybersecurity-related work).
  • Regular Events

    In collaboration with Quantum Technology FSP; for more info https://research.csiro.au/qt/

    • 6G security seminar series

    This seminar series is part of the 6G Security Research and Development Program conducted on behalf of the Australian Government – Department of Home Affairs. The Program aims to conduct foundational research into the security requirements of 6G technologies, and shape the development of 6G telecommunications standards internationally.

    6g technology background abstract illustration,Computer system and 6G system equipment,3d rendering